Citation graph for Security and Privacy Papers, 1980-2009

This a directed graph of citations of SP papers to SP papers.
It is in "scalable vector graphics" format, and should be viewable
in most web browsers. This is a very wide graph, and you
will probably want to "zoom" in to see the details.

An arrow from A to B means that A cites B.

The label has the year and approximate filename from the
"all years" DVD distributed to all SP and CSF attendees in 2009.

If A is not cited, it is a box.

The height of an oval gives a rough indication of its in-degree.

Holding the mouse cursor over a node will pop-up a small label with
the title of the paper.

The color is a gradient from red to blue. Red is for the most recent
papers, blue is for the oldest papers, purple is for papers midway
between.

The data undoubtedly has errors --- a lot of manual labor went into
culling the data and using heuristic methods to turn garbage into links.

This is a graph of the same data,
concentrating more on the outdegree of the nodes (papers that are
"magnanimous"). The node colors have the same meaning. However, the
boxes are papers that do not cite other papers. Taller ellipses
indicate papers that cite more papers. The link color is a gradient
showing the number of years between a paper and what it cites. Blue
is for a short interval, green is for a longer interval.

This was done with the GraphViz tool "dot". Here's the
input file. The "zgrviewer",
a Java application that works in conjunction with GraphViz,
provides an excellent interface for navigating large svg
files.

The Most Influential Oakland Papers

These are the papers most often cited by other Oakland papers:

Security Policies and Security Model, 1982

Unwinding and Inference Control, 1984

Specifications for Multi-Level Security and a Hook-Up Property, 1987

A Comparison of Commercial and Military Computer Security
Policies, 1987, Citation Evolution

Noninterference and the Composability of Security Properties, 1988

Information Flow in Nondeterministic Systems, 1990

The Chinese Wall Security Policy, 1989

Reducing Timing Channels with Fuzzy Time, 1991

A Sense of Self for Unix Processes, 1996

Reasoning about Belief in Cryptographic Protocols, 1990

Decentralized Trust Management, 1996

Security Models and Information Flow, 1990

A General Theory of Composition for Trace Sets Closed under
Selective Interleaving Functions, 1994

The "Gregarious" Oakland Papers

These papers are "gregarious" in that they both cite more than one paper
and are themselves cited more than once, and the total of the two is
at least 6.

Information Flow in Nondeterministic Systems

The Use of Logic in the Analysis of Cryptographic Protocols

A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions

Security Models and Information Flow

Practical Domain and Type Enforcement for UNIX

Intransitive Non-Interference for Cryptographic Purposes

Hardening COTS Software with Generic Software Wrappers

Variable Noise Effects Upon a Simple Timing Channel

A General Theory of Security Properties

Formalizing Sensitivity in Static Analysis for Intrusion Detection

Design of a Role-Based Trust-Management Framework

Intrusion Detection via Static Analysis

LOMAC: Low Water-Mark Integrity Protection for COTS Environments

A Secure Identity-Based Capability System

An Analysis of Covert Timing Channels

The Typed Access Matrix Model

Java Security: From HotJava to Netscape and Beyond

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques

Anomaly Detection Using Call Stack Information

SD3: A Trust Management System with Certified Evaluation

Preserving Information Flow Properties Under Refinement

Controlling Logical Inference in Multilevel Database Systems

The Algebra of Security

Safety Analysis for the Extended Schematic Protection Model

A Secure and Reliable Bootstrap Architecture

Relating Symbolic and Cryptographic Secrecy

Semantics-Aware Malware Detection

Views as the Security Objects in a Multilevel Secure Relational Database Management System

Multiversion Concurrency Control for Multilevel Secure Database System

Some Conundrums Concerning Separation of Duty

Probabilistic Interference

Exploring the BAN Approach to Protocol Analysis

Simple Timing Channels

Complete, Safe Information Flow with Decentralized Labels

Understanding Java Stack Inspection

Exploring Multiple Execution Paths for Malware Analysis

A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors

IRM Enforcement of Java Stack Inspection

Compartmented Mode Workstation: Results Through Prototyping

Storage Channels in Disk Arm Optimization

A Semantic Model for Authentication Protocols

A Logical Language for Specifying Cryptographic Protocol Requirements

Prudent Engineering Practice for Cryptographic Protocols

Network Version of the Pump

A Practically Implementable and Tractable Delegation Logic

Some Statistics

This shows for each five year period, how many papers there
were in that period, the total number of authors, the number
of papers that cite other Oakland papers, the total number
of citations of Oakland papers, and the total number of
years "spanned" (i.e., the summation of difference in year
published to year cited).